Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    77s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2022, 07:01

General

  • Target

    OneKeyGhost.exe

  • Size

    3.7MB

  • MD5

    4b3f6bcc529935d229602e290de32f8f

  • SHA1

    f3d56e4c69eebe3edb9793042dc619958dee6b32

  • SHA256

    158a85b17171aad0c55a8b84a9e2795890d736a26c665af94b5b1ebc3b0e6a9a

  • SHA512

    7b8a3820fdafd0afb27893404ee469fd3a35fb0ee4206e356010b448ec4b651ddabb266b8b8116ccfb1c542c910ac5234f92b705fe2559185052b0c650f18710

  • SSDEEP

    49152:31vqjdPQAQuybzSOUTwCP/bJNILkwXU+eYLPj7BVES91mrWQxmE+0/7IW0vwn90w:31vqjhqa5cizJNFjij7BH91mSQxpGwH

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 14 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OneKeyGhost.exe
    "C:\Users\Admin\AppData\Local\Temp\OneKeyGhost.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://Www.OneKey.Cc/
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://Www.OneKey.Cc/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:980
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:980 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\RBU3U6J3.txt

    Filesize

    608B

    MD5

    3fe1b7f3a82cd292232e46041596bb60

    SHA1

    01e4b9fd3cd8bacee864d03faeb2d5810cb13141

    SHA256

    bff9418316ca45555d604138940344944ed67cba26e9107232fb905f7f38f282

    SHA512

    d75b55a36f2d71957a28e9a3ed79018e739b8d7095eeb2caeeca0be8fd869581198c6482b209681b8786c04086ad6c596b5da50595eb08a0a219f084d26c91f0

  • memory/1932-54-0x0000000075981000-0x0000000075983000-memory.dmp

    Filesize

    8KB